edix / HiddenProcessDetectionLinks
Examples for detection of hidden processes on windows
☆34Updated 11 years ago
Alternatives and similar repositories for HiddenProcessDetection
Users that are interested in HiddenProcessDetection are comparing it to the libraries listed below
Sorting:
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- Protect process fsfilter driver. Windows x64☆35Updated 9 years ago
- MIR-Engine☆24Updated 8 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- Simple standalone bundle of NT core APIs☆26Updated 9 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆37Updated 10 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Updated 12 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- Simple program for static hooking dynamic libraries in executable application☆23Updated 11 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- Class implementation of PowerLoader injection technique☆31Updated 8 years ago
- A command line tool to load and unload a device driver.☆47Updated 8 years ago
- Handy WMI query tool.☆12Updated 9 years ago
- A-Protect Anti Rootkit Tool☆54Updated 11 years ago
- The dll that can hide itself and then delete itselft.☆30Updated 12 years ago
- reverse win7 32bit hotpatch implement☆9Updated 11 years ago
- After Process monitor, execute Themida☆15Updated 7 years ago
- ☆14Updated 8 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Updated 10 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆24Updated 10 years ago
- ☆33Updated 6 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆23Updated 12 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 11 years ago
- windows kernel File redirection☆20Updated 10 years ago
- User-mode program parsing logs created by HyperPlatform☆18Updated 8 years ago